CVE-2013-2155

Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 does not properly validate length values, which allows remote attackers to cause a denial of service or bypass the CVE-2009-0217 protection mechanism and spoof a signature via crafted length values to the (1) compareBase64StringToRaw, (2) DSIGAlgorithmHandlerDefault, or (3) DSIGAlgorithmHandlerDefault::verify functions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 80%
VendorProductVersion
apachexml_security_for_c\+\+
𝑥
≤ 1.7.0
apachexml_security_for_c\+\+
0.1.0
apachexml_security_for_c\+\+
0.2.0
apachexml_security_for_c\+\+
1.1.0
apachexml_security_for_c\+\+
1.2.0
apachexml_security_for_c\+\+
1.2.1
apachexml_security_for_c\+\+
1.3.0
apachexml_security_for_c\+\+
1.3.1
apachexml_security_for_c\+\+
1.4.0
apachexml_security_for_c\+\+
1.5.0
apachexml_security_for_c\+\+
1.5.1
apachexml_security_for_c\+\+
1.6.0
apachexml_security_for_c\+\+
1.6.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xml-security-c
bullseye
2.0.2-4
fixed
bookworm
2.0.4-2
fixed
sid
2.0.4-2
fixed
trixie
2.0.4-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xml-security-c
raring
Fixed 1.6.1-6~build0.13.04.1
released
quantal
Fixed 1.6.1-6~build0.12.10.1
released
precise
Fixed 1.6.1-1ubuntu0.1
released
lucid
Fixed 1.5.1-3+squeeze2build0.10.04.1
released